How to Find Out if your Phone Has Spyware

Spyware is an application that allows a hacker to remotely access information on a computing device such as a smartphone. Finding spyware on your phone can be challenging because it’s specifically designed to remain undetected, although there are signs that can indicate that your phone is infected with spyware. Once detected, you’ll need to remove the spyware as quickly as …

Phishing Deep Dive: Whaling

Whaling scams are increasing at an alarming rate. Find out what whaling is and how you can protect your business from this type of attack.

Three Extremely Risky Practices to Avoid

A common question among businesses looking to improve their cybersecurity defenses is “Where should we focus our efforts?” A good place to start is to make sure your company is not engaging in risky practices. Here are three bad practices to avoid.

FBI Issues Warning for Critical Zoho Bug

A joint effort by multiple US government agencies has discovered a security threat that exploits Zoho’s ManageEngine ADSelfService Plus, a self-service password management solution with a single sign-on solution. These agencies include the Federal Bureau of Investigation (FBI), United States Coast Guard Cyber Command (CGCYBER) and Cybersecurity and Infrastructure Security Agency (CISA). This task force has designated the vulnerability as …

The New ZLoader Ransomware Variant

Search engines like Google are displaying search results that redirect the user to malicious links when they search for TeamViewer remote desktop software. These links download ZLoader malware onto the users’ system, creating a stealthy infection path that allows the attacker to install additional malware without detection.

China’s New Data Policy & What It Means

China enacted the Personal Information Protection Law (PIPL) on August 21, 2021 as part of that country’s growing scrutiny of its high tech sector. This law goes into effect on November 1, 2021 and will impose a new set of obligations for data security, especially when combined China’s Data Protection Law. Both of these laws fit into China’s information policy, …

The Conti Ransomware Gang & It’s Hacking Methods

The Conti ransomware gang is one of the most ruthless of its type. Beginning in early 2020, it has attacked organizations where the loss of data can have life-threatening consequences, including emergency medical services, hospitals, law enforcement agencies and 911 dispatch carriers. Ireland is still recovering from a Conti attack in May 2021 that resulted in the shutdown of that …

Phishing Deep Dive: Spear Phishing

Spear phishing and classic phishing are not one and the same. Discover how spear phishing emails differ from their classic counterparts and how to protect your company from spear phishing scams.